Skip to content

Commit bd1f08e

Browse files
Merge pull request #3784 from MicrosoftDocs/main
[AutoPublish] main to live - 05/14 15:30 PDT | 05/15 04:00 IST
2 parents 2074da5 + 3bb4283 commit bd1f08e

File tree

7 files changed

+25
-23
lines changed

7 files changed

+25
-23
lines changed

defender-endpoint/run-analyzer-linux.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ If you have issues with Microsoft Defender for Endpoint on Linux and need suppor
4545
2. Verify the download.
4646

4747
```bash
48-
echo 'B5EBD9AB36F2DB92C341ABEBB20A50551D08D769CB061EAFCC1A931EFACE305D XMDEClientAnalyzerBinary.zip' | sha256sum -c
48+
echo '7886E960546A8490C7CBD962330104B2454647131B89D26771610FDB5BB6BE3D XMDEClientAnalyzerBinary.zip' | sha256sum -c
4949
```
5050

5151
3. Extract the contents of `XMDEClientAnalyzerBinary.zip` on the machine.

defender-endpoint/run-analyzer-macos.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,13 +37,13 @@ If you're experiencing reliability or device health issues with Microsoft Defend
3737
If you're using a terminal, download the tool by running the following command:
3838

3939
```bash
40-
wget --quiet -O XMDEClientAnalyzerBinary.zip https://go.microsoft.com/fwlink/?linkid=2297517
40+
wget --quiet -O XMDEClientAnalyzerBinary.zip "https://go.microsoft.com/fwlink/?linkid=2297517"
4141
```
4242

4343
2. Verify the download.
4444

4545
```bash
46-
echo 'B5EBD9AB36F2DB92C341ABEBB20A50551D08D769CB061EAFCC1A931EFACE305D XMDEClientAnalyzerBinary.zip' | shasum -a 256 -c
46+
echo '7886E960546A8490C7CBD962330104B2454647131B89D26771610FDB5BB6BE3D XMDEClientAnalyzerBinary.zip' | shasum -a 256 -c
4747
```
4848

4949
3. Extract the contents of `XMDEClientAnalyzerBinary.zip` on the machine.

defender-endpoint/troubleshoot-performance-issues.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ First, you might want to check if other software is causing the issue. Read [Che
4444
|2. **Using HTA's, CHM's and different files as databases**. <br/>Anytime that Microsoft Defender Antivirus must extract and/or scan complex file formats, higher CPU utilization can occur. | Consider switching to using actual databases if you need to save info and query it. <br/><br/>As a workaround, add [Antivirus exclusions (process+path)](/defender-endpoint/configure-exclusions-microsoft-defender-antivirus). |
4545
|3. **Using obfuscations on scripts**. <br/>If you obfuscate scripts, Microsoft Defender Antivirus in order to check if the script contains malicious payloads, it can use more CPU utilization while scanning. | Use script obfuscation only when necessary.<br/><br/>As a workaround, add [Antivirus exclusions (process+path)](/defender-endpoint/configure-exclusions-microsoft-defender-antivirus). |
4646
|4. **Not letting the Microsoft Defender Antivirus cache finish before sealing the image**.| If you're creating a VDI image such as for a non-persistent image, make sure that cache maintenance completes before the image is sealed. <br/> For more information, see [Configure Microsoft Defender Antivirus on a remote desktop or virtual desktop infrastructure environment](/defender-endpoint/deployment-vdi-microsoft-defender-antivirus). |
47-
|5. **Having the wrong path exclusion(s) due to misspelling**. <br/>If you add misspelled exclusion paths, it can lead to performance issues.| Use `MpCmdRun.exe -CheckExclusion -Path` to validate path-based exclusions. |
47+
|5. **Misspelled exclusions**. <br/>| Use `MpCmdRun.exe -CheckExclusion -Path` to validate path-based exclusions. |
4848
|6. **When a path exclusion is added, it works for scanning flows**. <br/>Behavior Monitoring (BM) and Network Real-time Inspection (NRI) can still cause performance issues. |As a workaround, take these steps: <br/>1. (Preferred) For .exe's and dll's use [Indicators – File hash - allow](/defender-endpoint/indicator-file) or [Indicators – Certificate - allow](/defender-endpoint/indicator-certificates) <br/>2. (Alternative) [Add Antivirus exclusions (process+path)](/defender-endpoint/configure-exclusions-microsoft-defender-antivirus). |
4949
|7. **File hash computation**. <br/>If you enable file hash computation, which is used for [file indicators](indicator-file.md), there's more performance overhead. For example, copying large files from a network share onto your local device, especially over a VPN connection, might have an effect on device performance. | This is where you, and your leadership team will have to make a decision, of having more security or less CPU utilization. <br/><br/>One possible solution is to disable the File hash computation feature. Go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **MpEngine**, and then enable file hash computation features. <br/>**Note**: To enable Indicators - File hash functionality, this feature must be activated.|
5050

defender-endpoint/whats-new-in-microsoft-defender-endpoint.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,10 @@ For more information on what's new with other Microsoft Defender security produc
4646
- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
4747
- [What's new in Microsoft Defender Vulnerability Management](/defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management)
4848

49+
## May 2025
50+
51+
- (GA) New setting for **"Allow Network Protection On Win Server"** to be able to manage Network Protection for Windows Server 2019 and later in Microsoft Defender for Endpoint Security Settings Management and Microsoft Intune. See [Turn on network protection](/defender-endpoint/enable-network-protection).
52+
4953
## April 2025
5054

5155
- (Preview) **Contain IP addresses of undiscovered devices**: Containing IP addresses associated with devices that are undiscovered or are not onboarded to Defender for Endpoint is now in preview. Containing an IP address prevents attackers from spreading attacks to other non-compromised devices. See [Contain IP addresses of undiscovered devices](respond-machine-alerts.md#contain-ip-addresses-of-undiscovered-devices) for more information.

defender-office-365/anti-spam-protection-about.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom:
1919
- seo-marvel-apr2020
2020
description: Admins can learn about the anti-spam settings and filters that help prevent spam in Exchange Online Protection (EOP).
2121
ms.service: defender-office-365
22-
ms.date: 12/08/2024
22+
ms.date: 05/14/2025
2323
appliesto:
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2525
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -145,7 +145,7 @@ These settings aren't configured in the default anti-spam policy by default, or
145145

146146
² For **High confidence phishing**, the **Move message to Junk Email folder** action is effectively deprecated. Although you might be able to select the **Move message to Junk Email folder** action, high confidence phishing messages are always quarantined (equivalent to selecting **Quarantine message**).
147147

148-
³ You can this use value as a condition in mail flow rules to filter or route the message.
148+
³ You can this use value as a condition in [Mail flow rules in Exchange Server](/exchange/policy-and-compliance/mail-flow-rules/mail-flow-rules) to filter or route messages for mailboxes in on-premises Exchange environments.
149149

150150
⁴ If the spam filtering verdict quarantines messages by default (**Quarantine message** is already selected when you get to the page), the default quarantine policy name is shown in the **Select quarantine policy** box. If you _change_ the action of a spam filtering verdict to **Quarantine message**, the **Select quarantine policy** box is blank by default. A blank value means the default quarantine policy for that verdict is used. When you later view or edit the anti-spam policy settings, the quarantine policy name is shown. For more information about the quarantine policies that are used by default for spam filter verdicts, see [EOP anti-spam policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-spam-policy-settings).
151151

defender-xdr/m365d-permissions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.topic: concept-article
1717
search.appverid:
1818
- MOE150
1919
- MET150
20-
ms.date: 03/04/2024
20+
ms.date: 05/08/2024
2121
appliesto:
2222
- Microsoft Defender XDR
2323
---
@@ -36,8 +36,8 @@ There are two ways to manage access to Microsoft Defender XDR:
3636

3737
Accounts assigned the following **Global Microsoft Entra roles** can access Microsoft Defender XDR functionality and data:
3838

39-
- Global administrator
40-
- Security administrator
39+
- Global Administrator
40+
- Security Administrator
4141
- Security Operator
4242
- Global Reader
4343
- Security Reader
@@ -54,7 +54,7 @@ To review accounts with these roles, [view Permissions in the Microsoft Defender
5454
5555
## Access to functionality
5656

57-
Access to specific functionality is determined by your [Microsoft Entra role](/azure/active-directory/roles/permissions-reference). Contact a global administrator if you need access to specific functionality that requires you or your user group be assigned a new role.
57+
Access to specific functionality is determined by your [Microsoft Entra role](/azure/active-directory/roles/permissions-reference). Contact a Global Administrator if you need access to specific functionality that requires you or your user group be assigned a new role.
5858

5959
### Approve pending automated tasks
6060

defender-xdr/preview.md

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -16,21 +16,19 @@ ms.topic: conceptual
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 05/01/2024
19+
ms.date: 05/08/2024
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Defender for Business
23+
- Microsoft Defender for Endpoint
24+
- Microsoft Defender for Identity
25+
- Microsoft Defender for Cloud Apps
2026
---
2127

2228
# Microsoft Defender XDR preview features
2329

2430
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2531

26-
**Applies to:**
27-
28-
- Microsoft Defender XDR
29-
- Microsoft Defender for Business
30-
- Microsoft Defender for Endpoint
31-
- Microsoft Defender for Identity
32-
- Microsoft Defender for Cloud Apps
33-
3432
The Microsoft Defender XDR service is constantly being updated to include new feature enhancements and capabilities.
3533

3634
Learn about new features in the Microsoft Defender XDR preview release and be among the first to try upcoming features by turning on the preview experience.
@@ -52,17 +50,17 @@ When working with features in public preview, these features:
5250

5351
Accounts assigned the following Microsoft Entra roles can turn on Microsoft Defender XDR Preview features:
5452

55-
- Global administrator
56-
- Security administrator
53+
- Global Administrator
54+
- Security Administrator
5755
- Security Operator
5856

5957
## Turn on preview features
6058

6159
Turn on preview features to be among the first to try new features. Your feedback is valuable and helps to improve the overall experience before features are generally available.
6260

63-
In Microsoft Defender XDR, select **Settings > Microsoft Defender XDR > General > Preview features**, and select to turn on preview features.
61+
In the Microsoft Defender portal, navigate to **Settings > Microsoft Defender XDR > General > Preview features**, and select to turn on preview features.
6462

65-
If you already have preview features turned on, and you're a Microsoft Defender for Business, Microsoft Defender for Endpoint, or Microsoft Defender for Cloud Apps customer, you can also select to turn preview features on and off for specific services only. For example:
63+
If you already have preview features turned on and you're a Microsoft Defender for Business, Microsoft Defender for Endpoint, or Microsoft Defender for Cloud Apps customer, you can also select to turn preview features on and off for specific services only. For example:
6664

6765
:::image type="content" source="media/preview-features-settings.png" alt-text="Screenshot of the preview features settings.":::
6866

0 commit comments

Comments
 (0)